Search Results - (( based modeling protocol algorithm ) OR ( java based optimization algorithm ))
Search alternatives:
- protocol algorithm »
- modeling protocol »
- based modeling »
- java »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The optimization of a computationally intensive algorithm such as this on a mobile platform is challenging due to the limited resources available. …”
Get full text
Get full text
Conference or Workshop Item -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
3
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
4
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…By applying the proposed algorithm, the throughput of EDCA protocol was increased by 42.9% and it can support 14 voice users rather than 11 in the default EDCA protocol. …”
Get full text
Get full text
Get full text
Thesis -
5
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
6
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
7
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
8
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…Thus, the LDPC code encoder model is developed to identify a low complexity encoding algorithm of LDPC code for the DF protocol relay system. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…To validate the proposed ECG-based authentication protocol model, the FAR and FRR analysis is done and then followed by the complexity analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…The research objective is to have a low-power consumption protocol applied in a model network based on the actual environment suitable for illegal logging characteristics. …”
Get full text
Get full text
Get full text
Thesis -
12
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
Published 2019“…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
Get full text
Get full text
Thesis -
13
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). The study compares the performance of WOA with various existing strategies, such as Greedy, Density, TVG, Union, ParaOrder, ReqOrder, ITTDG, AURA, Java Algorithm (CTJ), TTSGA, and AFA. …”
Get full text
Get full text
Get full text
Article -
14
A heuristics approach for classroom scheduling using genetic algorithm technique
Published 2017“…The proposed of heuristics approach will prompt a superior utilization of the accessible classroom space for a given time table of courses at the university. Genetic Algorithm through Java programming languages were used in this study and aims at reducing the conflicts and optimizes the fitness. …”
Get full text
Get full text
Article -
15
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
16
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
17
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
18
Cohesive token passing algorithm utilizing software agents
Published 2010“…The core of the new protocol is based on the circulation mechanism of the token. …”
Get full text
Get full text
Article -
19
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…For EL video packets, an enhanced routing algorithm was proposed to route the Enhance Layer (EL) packets, namely, Energy Sensible and Route Stability Based Routing Protocol (ESRSBRP) which is used over Mobile network. …”
Get full text
Get full text
Get full text
Thesis -
20
A design of redirect link failure protocol based on dynamic source routing for mobile ad hoc networks
Published 2011“…If an alternative route is not available, the source node will reinitiate route discovery process to find a new route, which may result in the decrease of the performance of DSR protocol. Therefore, to avoid this situation, we propose an extension of DSR protocol called Redirect Link Failure Protocol (RLFP) in order to solve link failure problem and update routes in the route cache of DSR protocol.RLFP consists of three parts.The first part is based on Link Prediction Algorithm, which utilises signal power strength from the received packets to predict the link before any break down happens.The second part is based on Link Solution Model, which contains sub-models that can solve and redirect link failure.Finally, the Enhanced Route Cache Model, which possesses a scheme that is called “Updating Route Scheme”, to avoid stale routes.…”
Get full text
Get full text
Get full text
Get full text
Monograph
